Skip to content

Commit b95a5eb

Browse files
committed
Land rapid7#3535, Depreciate psh_web_delivery
2 parents 4fb5820 + 82abe49 commit b95a5eb

File tree

2 files changed

+9
-2
lines changed

2 files changed

+9
-2
lines changed

modules/exploits/multi/script/web_delivery.rb

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,13 +20,15 @@ def initialize(info = {})
2020
machine when the attacker has to manually type in the command himself, e.g. Command Injection,
2121
RDP Session, Local Access or maybe Remote Command Exec. This attack vector does not
2222
write to disk so it is less likely to trigger AV solutions and will allow privilege
23-
escalations supplied by Meterpreter.
23+
escalations supplied by Meterpreter. When using either of the PSH targets, ensure the
24+
payload architecture matches the target computer or use SYSWOW64 powershell.exe to execute
25+
x86 payloads on x64 machines.
2426
},
2527
'License' => MSF_LICENSE,
2628
'Author' =>
2729
[
2830
'Andrew Smith "jakx" <[email protected]>',
29-
'Ben Campbell <eat_meatballs[at]hotmail.co.uk>',
31+
'Ben Campbell',
3032
'Chris Campbell' #@obscuresec - Inspiration n.b. no relation!
3133
],
3234
'DefaultOptions' =>

modules/exploits/windows/misc/psh_web_delivery.rb

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,11 @@ class Metasploit3 < Msf::Exploit::Remote
1010

1111
include Msf::Exploit::Remote::HttpServer
1212

13+
include Msf::Module::Deprecated
14+
15+
DEPRECATION_DATE = Date.new(2014, 10, 23)
16+
DEPRECATION_REPLACEMENT = 'exploit/multi/script/web_delivery'
17+
1318
def initialize(info = {})
1419
super(update_info(info,
1520
'Name' => 'PowerShell Payload Web Delivery',

0 commit comments

Comments
 (0)